Remove “Recommended for you” pop-up virus (Removal Guide)

“Recommended for you” is a computer virus, which will display pop-ups containing advertisements and sponsored links, with the sole purpose of generating revenue for the cyber criminals.
The “Recommended for you” pop-up ads will be appear in the bottom right corner of the browser window, either as a box containing sponsored links, or in the form of an iPhone with advertisements.

This infection is designed specifically to make money. It generates web traffic, collects sales leads for other dubious sites, and can display advertisements and sponsored links within your web browser.

The “Recommended for you” virus is distributed through several means. Malicious websites, or legitimate websites that have been compromised, may drop this trojan onto a compromised computer. This drive-by-download often happens surreptitiously. Another method used to propagate this type of malware is spam email containing infected attachments or links to malicious websites. The threat may also be downloaded manually by tricking the user into thinking they are installing a useful piece of software.
The “Recommended for you” virus is also prevalent on peer-to-peer file sharing websites and is often packaged with pirated or illegally acquired software.

Once install on a computer, “Recommended for you” virus will modify the HOSTS file and will drop several other malicious files which will cause browse redirects to malicious websites.
Furthermore, this virus will also install a browser extension which will display advertisements pop-ups on Facebook, Amazon, Google and other websites that you are visiting.
These “Recommended for you” pop-ups cannot be closed because their isn’t any option to do so, and the only solution to remove this pop-ups is to click on the advertisement.
“Recommended for you” is a scam and a malicious software, we strongly recommend that you remove this trojan from your computer as soon as possible.

“Recommended for you” pop-ups – Virus Removal Guide

As part of its self defense mechanism, “Recommended for you” virus will install a ZeroAccess rootkit on the infected computer.In this first step, we will run a system scan with Kaspersky TDSSKiller to remove this rookit.

Before you can run Kaspersky TDSSKiller, you first need to rename it so that
you can get it to run. To do this, right-click on the TDSSKiller.exe icon and select Rename.
Edit the name of the file from TDSSKiller.exe to iexplore.exe, and then double-click on it to launch.

Kaspersky TDSSKiller will now start and display the welcome screen and we will need to click on Change Parameters.

In the new open window,we will need to enable Detect TDLFS file system, then click on OK.

Next,we will need to start a scan with Kaspersky, so you’ll need to press the Start Scan button.

Kaspersky TDSSKiller will now scan your computer for “Recommended for you” virus.

When the scan has finished it will display a result screen stating whether or not the infection was found on your computer. If it was found it will display a screen similar to the one below.

To remove the infection simply click on the Continue button and TDSSKiller will attempt to clean the infection.A reboot will be require to completely remove any infection from your system.

Malwarebytes Anti-Malware is a powerfull on-demand scanner which will remove “Recommended for you” malicious files from your computer.

You can download Malwarebytes Anti-Malware Free from the below link, then double click on it to install this program.MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK(This link will open a download page in a new window from where you can download Malwarebytes Anti-Malware Free)

When the installation begins, keep following the prompts in order to continue with the setup process. DO NOT make any changes to default settings and when the program has finished installing, make sure you leave both the Update Malwarebytes’ Anti-Malware and Launch Malwarebytes’ Anti-Malware checked,then click on the Finish button.

On the Scanner tab,select Perform quick scan and then click on the Scan button to start scanning your computer.

You will now be presented with a screen showing you the malware infections that Malwarebytes’ Anti-Malware has detected.Please note that the infections found may be different than what is shown in the image.Make sure that everything is Checked (ticked) and click on the Remove Selected button.

After your computer restarts, open Malwarebytes Anti-Malware and perform a full system scan to verify that there are no remaining threats.

STEP 3: Remove “Recommended for you” rootkit with HitmanPro

In some cases,”Recommended for you” will also install a rootkit on victims computer.To remove this rootkit we will use HitmanPro.

Download HitmanPro from the below link,then double-click on it to start this program.HITMANPRO DOWNLOAD LINK(This link will open a new web page from where you can download HitmanPro)IF you are experiencing problems while trying to start HitmanPro, you can use the Force Breach mode.To start HitmanPro in Force Breach mode, hold down the left CTRL key when you start HitmanPro and all non-essential processes are terminated, including the malware process. (How to start HitmanPro in Force Breach mode – Video)

HitmanPro will start and you’ll need to follow the prompts (by clicking on the Next button) to start a system scan with this program.

HitmanPro will start scanning your computer for “Recommended for you” malicious files as seen in the image below.

Once the scan is complete,you’ll see a screen which will display all the infected files that this utility has detected, and you’ll need to click on Next to remove this malicious files.

Click Activate free license to start the free 30 days trial and remove all the malicious files from your computer.

STEP 4: Reset the Windows Hosts file back to its default settings

The “Your website access has been restricted for downloading pirated software” trojan has modified your Hosts file, so that you’ll be redirected to those survey websites. To reset the Hosts file back to its default settings, we will run Microsoft Fix it 50267, however because usually the cyber criminals have changed the permissions for the HOSTS file, we will first need to revert this modification.

Hosts-perm.bat is a batch file that will reset the permissions for the Windows HOSTS file.
This infection will change the permissions on the HOSTS file so that you are unable to delete it or modify it. Hosts-perm.bat will reset these permissions so that you will once again have full access to it.
You can download Hosts-perm.bat from the below link:HOSTS-PERM.BAT DOWNLOAD LINK(This link will open a new web page from where you can download Hosts-perm.bat)
Double-click the hosts-perm.bat file and when it is done you will see a message stating “The Permissions on the HOSTS file have been reset.”.Press any key on your keyboard to exit the batch file.

HitmanPro.Alert prevents good programs from being exploited, stops ransomware from running, and detects a host of different intruders by analyzing their behavior. HitmanPro.Alert will run alongside your current antivirus without any issues.

TIP: What is “malware”?

Malware - short for malicious software - is an umbrella term that refers to any software program deliberately created to perform an unauthorized and often harmful action.
Viruses, backdoors, keyloggers, spyware ,adware, rootkits, and trojans are just a few examples of what is considered malware.
A few years ago,it was once sufficient to call something a 'virus' or 'trojan horse', however today's infection methods and vectors evolved and the terms 'virus and trojan' no longer provided a satisfactory definition for all the types of rogue programs that exist.

TIP: Avoid malware like a pro!

Keep your software up-to-date. This is especially true for things like your operating system, security software and Web browser, but also holds true for just about any program that you frequently use. Viruses often take advantages of bugs or exploits in the code of these programs to propagate to new machines, and while the companies that make the programs are usually quick to fix the holes, those fixes only work if they have been downloaded to your computer.

It's also important to avoid taking actions that could put your computer at risk. These include opening unsolicited email attachments, visiting unknown websites or downloading software from untrustworthy websites or peer-to-peer file transfer networks.

Need help?

If you would like help with any of these fixes, you can ask for free malware removal support in the Malware Removal Assistance forum. In this support forum, a trained staff member will help you clean-up your device by using advanced tools. Never used a forum? Learn how.

Helpful Links

Community

TIP

Without meaning to, you may click a link that installs malware on your computer. To keep your computer safe, only click links and downloads from sites that you trust. Don’t open any unknown file types, or download programs from pop-ups that appear in your browser.

MalwareTips.com is an Independent Website. All trademarks mentioned on this page are the property of their respective owners.We can not be held responsible for any issues that may occur by using this information.